emalderson / ThePhishLinks
ThePhish: an automated phishing email analysis tool
☆1,262Updated last year
Alternatives and similar repositories for ThePhish
Users that are interested in ThePhish are comparing it to the libraries listed below
Sorting:
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆943Updated 2 weeks ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆717Updated last month
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆828Updated 2 months ago
- A suite of Tools to aid Incidence Response and Live Forensics for - Windows (Powershell) | Linux (Bash) | MacOS (Shell)☆597Updated 11 months ago
- Awesome Security lists for SOC/CERT/CTI☆1,091Updated this week
- A query aggregator for OSINT based threat hunting☆908Updated last week
- Incident Response Methodologies 2022☆1,068Updated 4 months ago
- A resource containing all the tools each ransomware gangs uses☆1,115Updated last week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆701Updated 7 months ago
- AIL framework - Analysis Information Leak framework☆776Updated last week
- Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red…☆947Updated last week
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,422Updated 11 months ago
- Collaborative Incident Response platform☆1,252Updated this week
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,049Updated 2 months ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆937Updated last year
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,194Updated 2 months ago
- SIEM Tactics, Techiques, and Procedures☆659Updated 3 weeks ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆684Updated 4 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆599Updated 3 weeks ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆402Updated 3 months ago
- Yet another Ransomware gang tracker☆480Updated this week
- Purple Team Exercise Framework☆731Updated last year
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆590Updated this week
- E-Mail Header Analyzer☆687Updated 2 years ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆405Updated last year
- Digital Forensics Investigation Platform☆841Updated 10 months ago
- A collection of phishing samples for researchers and detection developers.☆346Updated this week
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆663Updated 2 years ago
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,083Updated this week
- Practical Windows Forensics Training☆683Updated last year